共查询到20条相似文献,搜索用时 125 毫秒
1.
2.
刘志远 《计算机应用与软件》2008,25(8)
移动自组织网络是由无线移动节点组成的复杂分布式通信系统.研究了移动自组织网络的入侵检测问题,对当前Ad hoc网络上的入侵行为和入侵检测技术进行了分析,论述了学习Petri网络应用于入侵检测系统中的优势,给出了一个基于学习Petri网络的入侵检测实施模型,并在网络仿真软件ns2中对其进行了评估. 相似文献
3.
4.
5.
6.
7.
8.
随着移动自组织网络在各个领域内得到广泛的使用,其安全性研究显得越来越重要。DDoS攻击给有线网络造成了很大的威胁,同样也威胁到了移动自组织网络的安全性。由于移动自组织网络和有线网络存在着结构型差异,因此移动自组织网络中的DDoS攻击研究与有线网络中的DDoS攻击研究有较大的不同。论文首先描述了移动自组织网络的安全状况;然后从移动自组织网络的网络架构出发,分别分析移动自组织网络中针对物理层、MAC层、网络层以及传输层的DDoS攻击,同时总结针对不同网络层次的攻击所需要采取的防御措施;最后为移动自组织网络建设过程中就如何防范DDoS攻击提出参考意见。 相似文献
9.
10.
11.
One's model of skill determines what one expects from neural network modelling and how one proposes to go about enhancing
expertise. We view skill acquisition as a progression from acting on the basis of a rough theory of a domain in terms of facts
and rules to being able to respond appropriately to the current situation on the basis of neuron connections changed by the
results of responses to the relevant aspects of many past situations. Viewing skill acquisition in this ways suggests how
one can avoid the problem currently facing AI of how to train a network to make human-like generalizations. In training a
network one must progress, as the human learner does, from rules and facts to wholistic responses. As to future work, from
our perspective one should not try to enhance expertise as in traditional AI by attempting to construct improved theories
of a domain, but rather by improving the learner's access to the relevant aspects of a domain so as to facilitate learning
from experience. 相似文献
12.
黄全 《数字社区&智能家居》2008,(3)
防火墙作为网络安全设备越来越多地应用于局域网络与公用网络的互联中,具有服务代理、包过滤、入侵检测等功能。防火墙作为一个网络互连设备,在组建网络中还有着局域网与Internet互联、隐藏防火墙外网IP地址、隐藏内部网络、IP地址重定向、安全访问控制以及构建VPN等应用。文中结合某单位的局域网规划设计就防火墙的应用作了重要的阐述。 相似文献
13.
14.
党伟 《计算机光盘软件与应用》2012,(2):121+123
目前我们铁路运输事业快速发展,全国各地都新建了高铁铁路。速度是提升了,安全问题也不能忽视。列车在运行过程中要想保证安全,就需要铁道各处的信号信息正确。控制台通过相关的信号设备将运行的指令传递给列车,以保证铁路的整体运行情况。在新的时期,需要能够全天候检测铁路安全的方法,以便维修人员能够及时了解问题并处理。本文通过对TJWX-2006型信号设备监测系统进行研究,来分析在铁路上使用微机来检测铁路的运行情况。这对研究信号设备安全有着积极的意义。 相似文献
15.
《Ergonomics》2012,55(4):441-475
The operation of machines typically requires attention to instruments that signal the state of the machine. One safeguard against primary instrument malfunction is to provide backup instruments, but this works only if the operators react to malfunction by switching attention to the backups. Little is known about the effect of negative outcomes or feedback on allocation of attention to backup instruments. Four experiments demonstrated that prior practice causes operators of a simulated machine to adapt to instrument malfunction by changing to a suboptimal decision rule rather than by reallocating attention to a different set of instruments. This fallacy appears linked to the operators' failures to notice feedback that they should switch during the simulations and operators' failures to correctly interpret outcome feedback following the simulations. The results raise theoretical questions and warn interface designers not to overrate backup instruments. 相似文献
16.
17.
B. Iung 《Journal of Intelligent Manufacturing》2003,14(1):59-82
One of the main consequences of the extended enterprise is the emergence of new forms of relationships between the customer and the supplier in order to ensure the quality of service of the object throughout the life cycle. Innovative communication and co-operation methods are needed to support these new relationships. The combination of modern information processing and communication tools, commonly referred to as tele-service, offers the technical support required to access remote information. Indeed, it is easier to transfer information and knowledge to different actors than to move an actor to the site. However, even if this technical support is necessary for information communication, it is insufficient to develop a co-operation-based working situation that involves many self-motivated customers and suppliers sharing a common goal. This synergy is an emergent property of the system as a whole, and it is not expected to be obtained as a simple sum of its components. For example, a challenging problem in the field of product manufacturing is to assist the operator in its decision-making, when the system functioning is degraded, to preserve the system under service at maximum (anticipation of the failure) while remaining it in a space of allowed operation (to avoid consequences of an error in judgement). That means an evolution from tele-service to e-work and e-maintenance in particular where the assistance to operator results from collaboration of maintenance processes and experts. Consequently, this paper examines some issues and challenges involved in the evolution from the tele-maintenance of an industrial platform to the e-maintenance, and then proposes a multi-agent system-based collaboration as a solution to implement the e-maintenance experiments. 相似文献
18.
This study set out to investigate the type of media individuals are more likely to tell self-serving and other-oriented lies, and whether this varied according to the target of the lie. One hundred and fifty participants rated on a likert-point scale how likely they would tell a lie. Participants were more likely to tell self-serving lies to people not well-known to them. They were more likely to tell self-serving lies in email, followed by phone, and finally face-to-face. Participants were more likely to tell other-oriented lies to individuals they felt close to and this did not vary according to the type media. Participants were more likely to tell harsh truths to people not well-known to them via email. 相似文献
19.
IPv6协议下域名系统的扩展与实现 总被引:1,自引:0,他引:1
为了实现对IPv6协议的支持,需要对现有IPv4协议下的域名系统进行相应的扩展,以使其能在IPv6协议下正确地进行IP地址与域名的正向或反向解析。域名系统的扩展主要包括以下两方面:一是增加了两个新的资源记录AAAA和A6来存储IPv6地址,以实现域名到IPv6地址的正向解析;二是增加了两个新域:ip6.int和ip6.arpa,以实现IPv6地址到域名的反向解析。文中以著名的域名系统软件BIND为对象,以Linux操作系统Redhat9作为实验平台,详细介绍了基于Linux平台的域名系统对IPv6协议的扩展与实现,从而为实现IPv4到IPv6的平稳过渡打下了坚实基础。 相似文献
20.
Ammar Amran Manmeet Kaur Mahinderjit Singh 《Information Security Journal: A Global Perspective》2018,27(2):119-131
Security warning is a form of computer dialog communication used to inform the users on the risks of allowing random applications to run on a computer system. Accordingly, it is specifically designed to impersonate a legitimate security alerting function (e.g., notify, warn, and advice) to a user about the consequence effect of an action. However, most of the computer users tend to ignore those security warnings conveying the same message over and over again. This eventually leads to habituation. Considering the fact that there is a significant lack of focus paid to address this issue, the main objective of this article is to describe and summarize the related studies on users’ habituation to the security warnings. This article presents a systematic literature review to explore the current key issues, challenges, and the possible solutions related to habituation effects in security warnings. It is expected that this article could contribute to a more complete understanding of the habituation effects in security warnings and eventually bring benefits to the research communities or general publics. 相似文献